Sciweavers

1816 search results - page 158 / 364
» Case study in modeling and simulation validation methodology
Sort
View
ICST
2008
IEEE
15 years 11 months ago
Test-Driven Assessment of Access Control in Legacy Applications
If access control policy decision points are not neatly separated from the business logic of a system, the evolution of a security policy likely leads to the necessity of changing...
Yves Le Traon, Tejeddine Mouelhi, Alexander Pretsc...
DAC
2008
ACM
16 years 5 months ago
Predictive design space exploration using genetically programmed response surfaces
Exponential increases in architectural design complexity threaten to make traditional processor design optimization techniques intractable. Genetically programmed response surface...
Henry Cook, Kevin Skadron
ICRA
1999
IEEE
113views Robotics» more  ICRA 1999»
15 years 9 months ago
Laser Based Pose Tracking
: This paper develops methodology and technique for pose tracking of an autonomous mobile robot (AMR) using a laser scanner. A low-complexity and accurate pose-tracking EKF-based a...
Patric Jensfelt, Henrik I. Christensen
MICRO
2008
IEEE
137views Hardware» more  MICRO 2008»
15 years 4 months ago
Verification of chip multiprocessor memory systems using a relaxed scoreboard
Verification of chip multiprocessor memory systems remains challenging. While formal methods have been used to validate protocols, simulation is still the dominant method used to ...
Ofer Shacham, Megan Wachs, Alex Solomatnikov, Amin...
COMPLEX
2009
Springer
15 years 11 months ago
A Preliminary Study on the Effects of Fear Factors in Disease Propagation
Upon an outbreak of a dangerous infectious disease, people generally tend to reduce their contacts with others in fear of getting infected. Such typical actions apparently help to ...
Yubo Wang, Jie Hu, Gaoxi Xiao, Limsoon Wong, Stefa...